Application Velocity: The Future of Hybrid Cloud Success

The application lifecycle is accelerating. And now you have multiple datacenter and cloud environments to manage. Traditional management tools just don’t fit a rapidly evolving landscape of applications, clouds and users. Like it or not, the cloud is hybrid. How are you going to manage your hybrid cloud world?

ALM QC 12.55 has just been released in August, providing enhanced features and benefits for Application teams, end users and ALM admins working together to deliver high quality applications with confidence.

Join us as we review the key newly released capabilities of ALM/QC 12.55 and walk through a live demo.

ALM/QC 12.55 Highlights include:

•Test board enhancements providing improved user experience for test management and execution
•Support for Quality of Things (QoT) – ALM client for offline/online Internet of Things (IoT) & device manual testing
•Improved collaboration through integration of Skype for business
•Upgraded administration with ability to back up large files
•Synchronization tools connecting ALM to other management tools such as JIRA, TFS and RTC

We will also discuss the benefits of ALM Octane – our next-generation ALM product with Agile and DevOps capabilities built in, and how you can get started today!

Agile works well for small, co-located teams that can hover around sticky notes on a Kanban board, and collaborate on-demand. But as initiatives become more complex, and teams become dispersed, Agile can be difficult to scale across the enterprise.

What’s missing in Agile practices today is the ability to see the whole picture. With user stories as the source of record for an application, it’s hard to connect all the dots to see the complete functionality of a feature or capability. Think about the new team who will be developing additional features on that capability - where can they learn everything it does today? How will they know the impact their changes will have on that capability or potentially other capabilities? How will they collaborate on those changes and get them reviewed in a timely manner? How will your business stakeholder understand the impact of new those changes to the overall business process? Storyteller provides a centralized reusable searchable repository of exiting business and technical process models and requirements (business, non-functional and regulatory). In addition we also offer rich visualization, collaboration and review functionalities. These base capabilities are being used today to address the questions above. And - we do it in a way that everyone can understand from Business Stakeholders down to developers and testers.

Storyteller is a key player in Enterprise Agile. We bridge the business gaps in the current agile process. For companies struggling with Agile Transformation, we providing guardrails around writing user stories and feature decomposition. Project teams can save time and effort by using our user story and test plan generation which can them be automatically synched over to ALM tools. We are also a key player in the BizDevOps chain by providing that upfront business alignment so what is produced though “Dev” and delivered and maintained by “Ops” is exactly what “Biz” wanted.

HDFS on Kubernetes: Lessons Learned is a webinar presentation intended for software engineers, developers, and technical leads who develop Spark applications and are interested in running Spark on Kubernetes. Pepperdata has been exploring Kubernetes as potential Big Data platform with several other companies as part of a joint open source project.

Network engineering and operations teams face a complex, moving target. But unfortunately, they’re typically armed with only a disparate collection of management tools - with little or no integration. Network teams deal with equipment outages, slowdowns, security breaches, inability to reach resources, access denials, and other issues that can be caused by anything from a bad connection to devious hackers.

To address these challenges, we are now offering the 5th suite in the ITOM portfolio – Network Operations Management (NOM). Combining the functionality of Network Node Manager i (NNMi) and Network Automation (NA) and additional suite functionality such as reporting, NOM represents our path forward to managing web-scale networks with their evolving mix of physical, virtual, and software-defined networks.
Join this webinar to get an in-depth understanding about Network Operations Management including:
•Enhanced workflows designed to drive productivity and reduce
•Ongoing capability and content enhancements for both the suite and standalone products
•New licensing models to enable upgrades at an average of half the cost of a la carte purchases

Hear Micro Focus R&D’s recorded webinar at Vivit! See a review and demonstration of LoadRunner/Performance Center 12.55 that empowers DevOps teams to manage complexity in today’s world. Don’t miss out on this informative webinar!

The adoption and popularity of containerized applications has exploded in recent years. According to Gartner, more than 50% of new workloads will be deployed in containers by 2018.

But where does that leave the other 50%? How are virtual machines measuring up and how will applications built on these infrastructures survive the digital transformation caused by Docker and other container platforms?

Join this expert panel discussion with Fabio Gomez, Cloud Solution Architect- CASE, IBM, Tarak Modi, President & CTO of TekNirvana, Swen Conrad, CEO of Ocean9, and Phil Mullan, Head of Engineering at Huddle, to discuss which IT infrastructure makes the most sense for your business in the digital age, and the pros and cons of different operating systems.

Docker containers are changing the way we build, deploy, and access current day software solutions. They help us build, share and use software across any device, on any platform and anywhere in a seamless manner. In this session, you will see how to dockerize a basic piece of software, pushing it to the docker registry and pulling other docker images into your system.

If you have been tasked with building an application security program, or your organization is starting to consider one, you may be curious where to start.

Not only does application security rely on sound security understanding, it also relies on a fundamental understanding of software development. You must consider things like budget, or lack thereof, resources, priorities, and strategy when building an application security program.

In this talk, James Jardine, CEO of DevelopSec, will talk about these different considerations when just getting started. Come learn some of the key elements to helping get your application security program started in the right direction.

James Jardine is CEO of DevelopSec, owner of Jardine Software, an application security consultancy, as well as founder and regular contributor to Down the Security Rabbit Hole and DevelopSec podcasts. He has over 16 years experience focusing on application security and software development. James is a regular keynote speaker, including InfoSec World 2017.

So you need to secure your Java web application, but where do you start? This presentation will walk you through the OWASP Top 10 list of application security vulnerabilities and introduce the tools you need to implement basic security in your own applications. By the end of this session you should understand how to get started with web security in Java, know what tools are available, and be aware of resources you can use for self-study.

Microservices architectures provide unprecedented agility and scalability for enterprise applications. However, despite being so popular with the tech community, not everyone understands when or how to use microservices to innovate their IT architecture. So what does it take to become faster and more resilient in the digital transformation era? Join this panel and learn more:

- What are the benefits of adopting microservices?
- Are microservices for everyone?
- Are microservices a good fit for legacy architectures?
- How to use microservices for innovation purposes?

The adoption of new approaches to business is accelerating fast and what ‘digital transformation’ means is changing at an astonishing rate. We already have legacy implementations and lots of fragmentation from early forays into cloud services. How do we execute a new transformation strategy while trying to manage multiple platforms from mainframe to legacy cloud?
​
Engaging multiple disciplines and technologies and driving change rapidly whilst continuing to operate a business dependent on legacy systems requires significant cultural change and while much of this must come from within the business, there is a real opportunity for CIOs to create and own the digital agenda. In this session, Simon will examine different approaches to people, process and technology that can be used to enable a coherent transformation strategy.

Early on in the "cloud" Werner Vogals made his famous quote "You Build It, You Run It".

With Devops we learned that this became a mantra for shared responsibility between developers and operations. Operations learned how to process infrastructure as code and participate early in the supply chain of a service's life cycle. Developers learned that they had responsibilities to enable and in some cases operationalize their service.

Now there is a new movement to include and collaborate in a similar way with Security. This is all part of an "everything" shift left ideal. Developers and operations are taught the importance of including security in the stories and all parts of the delivery pipeline including security gates as well as code test gates.

About the speaker:
John Willis is VP of DevOps and Digital Practices at SJ Technologies. Prior to SJ Technologies he was the Director of Ecosystem Development for Docker, which he joined after the company he co-founded (SocketPlane, which focused on SDN for containers) was acquired by Docker in March 2015. Previous to founding SocketPlane in Fall 2014, John was the Chief DevOps Evangelist at Dell, which he joined following the Enstratius acquisition in May 2013. He has also held past executive roles at Opscode/Chef and Canonical/Ubuntu. John is the author of 7 IBM Redbooks and is co-author of the “DevOps Handbook” and the upcoming Beyond the Phoenix Project.

The microservice architecture has become an established and powerful way to structure large scale systems, providing a component model that scales both at the human and system levels. It is by nature an architecture that has lots of small parts. And it's easy to make a big
mess with lots of little things.

Complexity has moved into the network. That's a better place for it than unreadable code. But you still need to know how to manage that complexity. What are the patterns that you use to build message flows between services? What are the ways that those messages flows will
fail? Are they scalable? How do you distribute complexity evenly?

To answer these questions, you need to be able to visualize your microservice interactions, so you can describe them and make them accessible. This talk provides practical answers to
those questions, provides you with a method for designing microservice architectures, and introduces a new visual syntax to describe them.

Speaker's bio:
Richard Rodger is a co-founder of nearForm.com. Richard is an expert and thought-leader in next-generation enterprise software delivery, with a focus on Node.js and microservices. He is currently writing The Tao of Microservices (available on early release from manning.com/books/the-tao-of-microservices), a comprehensive guide to designing and
building microservice systems. His first book Mobile Application Development in the Cloud (Wiley, 2010) is one of the first major works on the intersection of Node.js, Cloud, and Mobile.
Richard was previously CTO of FeedHenry, a mobile application platform provider that was acquired by RedHat for €63.5m in 2014.
Since Richard co-founded nearForm in 2011, the company has become the world’s largest Node.js and microservices consulting company.

Running applications and services across several cloud providers and/or data centers can bring many benefits for organisations. Actually, in some cases it can even be a mandatory requirement. Making your application stack compliant with multiple cloud providers can be problematic as there are differences between cloud providers, for example in networking configurations. And to make things even more difficult, you should have a way to secure the intra-services’ communications between many cloud providers. In practice this means cumbersome network configurations with VPN and other networking security solutions. Luckily containers and modern (container) overlay networks can solve this complexity for you.

In this session, we'll dive deep into how to easily setup a container platform hosted on multiple different cloud providers with a secured overlay networking for intra-service communications. Participants will learn how to utilize containers and overlay networks to build highly resilient microservice architectures.

In this presentation we discuss how HPE APM is evolving to keep up with the latest advances in technology and some of the new capabilities that will become available in the next release. You will learn about:

• Platform - the new, clean and uncluttered HTML5-based interface design and the new Application Health displaying per application availability, performance and underlying infrastructure status in an easy to understand dashboard

• APM Mobile app - the new mobile app that displays the status of your business applications and enables drill down to RUM and BPM reports

• BPM - the integration with Mobile Center and support for AWS device farm and emulators

• Diagnostics - the new UI and the integration between the on-premises and SaaS solutions

• SiteScope - the integration with AWS and Azure for hybrid service assurance, the new public APIs, and Kubernetes monitoring capabilities

We will conclude the presentation with a short demo of some of the features of the product, and provide you ample opportunities to ask questions and become fully informed about the products and their future strategy and roadmap.

The cloud-based (SaaS) APM solution, the integrations between the cloud-based and the on-premises solution, and the unification roadmap of the two solutions.

• The similarities and differences between HPE BPM and AppPulse ActiThe monitoring of mobile apps with AppPulse Mobile and what is required to do so

• The monitoring of browser-based application and solve some of the challenges brought about by AJAX and single-pages apps (SPAs)

• How you can follow a transaction from the client app and device all the way through to the server side application

• How you can identify availability and performance problems and how you can isolate them to the individual class, method or SQL call

We will conclude the presentation with a short demo of some of the product features, and provide you ample opportunities to ask questions and become fully informed about the products and their future strategy and roadmap.

Docker adoption has surged, up 40% over the past year, taking the lead for DevOps tools on AWS. With this transformation, enterprises are looking for ways to confidently introduce Docker into their Cloud environment. Join us as Cavirin experts guide you through:

> Securing EC2 Container Services, as well as Docker images, brought in from different registries
> Integrating CloudTrail and CloudFormation
> Today's best Docker security practices on AWS
> The latest on Kubernetes

Octane I/O provides an enterprise grade, near real time integration of HPE ALM or HPE Octane with four popular Agile development tools (Atlassian JIRA, Microsoft TFS, CA Agile Central/Rally and VersionOne). This webinar will provide:

•High level introduction to the new synchronization offering
•Sampling of integration use cases between HPE tools and 3rd party Agile tools
•Technical demo of HPE ALM Octane I/O
•Details for accessing your licenses
•Where to get more information

You'll have everything you need to quickly get HPE ALM or Octane connected to your Agile tools.

Join this webinar to hear a panel of experts that recently led a discussion at the Delaware Local User Group meeting. Each of these experts will provide examples of what most organizations are facing today, why security should be important to you, and how you can mitigate these security risks now. You will leave the webinar with immediate actions you can use.